Campaigns

Campaigns are the core of Phishing Club. This is where you setup, monitor and manage phishing campaigns.

Overview

The campaigns page displays all phishing simulation campaigns and provides access to campaign data, recipient information, and management functions from a single interface.

Phishing Club - Campaigns overview
Campaigns overview showing status, data, and management options

Click on any campaign name to access detailed data, recipient interactions, and management options for that specific campaign.

Create new campaign

Prerequisites

Before creating a campaign, ensure you have the following components configured:

  • A template with all required elements
  • At least one group with recipients
  • Configured domains and email delivery settings
  1. Step 1: Basic Campaign Information

    Begin by clicking New Campaign on the campaigns page and configure the campaign settings.

    Phishing Club - Create campaign step 1
    Campaign Creation Step 1: Basic Information and Configuration
    Campaign Basic Information
    Configuration Description
    Campaign Name Descriptive name to identify this simulation campaign
    Template Template containing email design, landing pages, and delivery settings
    Campaign Type Test campaigns are excluded from aggregated data and marked with a test label for testing purposes
  2. Step 2: Target Recipient Selection

    Select the recipient groups that will be targeted in this campaign. Choose from your pre-configured groups to define your simulation audience.

    Phishing Club - Create campaign step 2
    Campaign Creation Step 2: Recipient Group Selection

    Note: The number beside each group represents the total recipients in that group. Each recipient is included only once, even if they belong to multiple selected groups.

  3. Step 3: Delivery Method Configuration

    Configure how and when your campaign emails will be delivered by selecting a delivery method that matches your simulation objectives.

    Phishing Club - Create campaign step 3
    Campaign Creation Step 3: Delivery Method Selection

    Time Box Delivery

    The Time Box method evenly distributes email sending across your specified time window, ensuring consistent delivery patterns.

    Phishing Club - Create campaign step 3 - Time box
    Time Box Delivery Configuration
    Time Box Delivery Options
    Setting Description
    Delivery Start Campaign launch date and time
    Delivery End Campaign completion date and time
    Sort By Organize delivery order by recipient attributes (e.g., department, location)
    Sort Order Ascending or descending order for the selected sort criteria
    Auto-Close Automatically complete campaign at specified time. Completed campaigns stop recording new interactions.
    Auto-Anonymize Automatically anonymize all recipient data while preserving aggregate statistics for compliance purposes

    Daily Slots Delivery

    Use Daily Slots for precise control over delivery timing, restricting emails to specific weekdays and hours.

    Example: Monday through Friday, 8:00 AM to 4:00 PM

    Phishing Club - Create campaign step 3 - Daily Slots
    Daily Slots Delivery Configuration
    Daily Slots Configuration
    Setting Description
    Campaign Duration Overall start and end dates for the campaign period
    Delivery Sorting Recipient organization criteria and sort order
    Active Days Specific weekdays when emails should be delivered
    Delivery Hours Time window within each active day for email sending
    Auto-Close Automatic campaign completion settings
    Auto-Anonymize Scheduled data anonymization for privacy compliance

    Self-Managed Delivery

    Self-Managed campaigns provide flexibility by allowing manual control over email delivery. This method is ideal for custom delivery scenarios, multi-channel approaches, or integration with external systems. Delivery when and how you want.

    Phishing Club - Create campaign step 3 - Self Managed
    Self-Managed Campaign Configuration
    Self-Managed Campaign Options
    Setting Description
    Manual Close Configure when to manually complete the campaign and stop recording interactions
    Manual Anonymization Settings for manually triggered data anonymization while maintaining statistical integrity
  4. Step 4: Miscellaneous

    Configure if the campaign should save submitted data, assign webhooks and setup security for the campaign.

    Phishing Club - Create campaign step 4 - Miscellaneous
    Campaign Configuration Options
    Advanced Campaign Features
    Field Description
    Data Collection Enable collection and storage of data submitted by recipients on phishing pages
    Security configuration Configure Anti-Bot / Evasion and IP allow or deny listing for the campaign.

    Security configuration

    Configure if the campaign should save submitted data, assign webhooks and setup security for the campaign.

    Phishing Club - Create campaign step 4 - Miscellaneous - Security configuration
    Campaign security configuration
    Security configuration
    Field Description
    Deny Page The page to show when the visitor is denied access
    Anti-bot / Evasion Page The page to use as evasion page. Uses the {{.URL}} for loading the page and {{.DenyURL}} for the deny page.
    IP filtering Which IP filtering mode to use.
    Lists IP filter lists to use
  5. Step 5: Campaign Review

    Review all campaign configurations before launching your phishing simulation. This final step prevents configuration errors and ensures proper campaign operation.

    Phishing Club - Review
    Final Campaign Review and Launch Interface

    Verify all settings, recipient selections, and delivery configurations. When satisfied with your campaign setup, click Create Campaign to launch your phishing simulation.

Score cards

The score cards at the top of each campaign page provide quick data summaries. Clicking a score card switches the percentage between absolute and relative.

Phishing Club - Campaign score cards
Campaign data display
Campaign Data Fields
Field Description
Recipients Total number of recipients targeted by this campaign
Emails Sent Number of emails successfully delivered to date
Emails Read Unique recipients who opened the email (read confirmation received)
Website Visits Unique recipients who clicked through to phishing pages
Reported Unique recipients that have reported the campaign

Timeline

The campaign timeline provides a visualization of all campaign events.

Phishing Club - Campaign timeline
Campaign timeline showing chronological event progression and user interactions

Timeline Navigation

  • Zoom In: Double-click or scroll to focus on specific time periods
  • Event Details: Hover over any event marker to view detailed information
  • Time Format: Toggle between 12h and 24h time formats
  • Reset View: Click Reset View to see the complete timeline

Campaign details

The campaign details section provides information about your simulation configuration, template settings, and available management actions.

Phishing Club - Campaign details
Campaign configuration details and settings overview

Click on the Template link to access information about the template configuration used in this campaign.

Phishing Club - Campaign template details
Template configuration showing email design, landing pages, and delivery settings

Campaign Actions

Manually handle campaign actions such as closing, anonymizing, uploading reports or exporting data.

Phishing Club - Campaign actions
Campaign management actions for lifecycle control and data export
Available Campaign Actions
Action Description
Close Campaign Immediately completes the campaign and cancels any pending email deliveries. No further interactions will be recorded.
Anonymize Campaign Closes the campaign and anonymizes all collected data. Individual recipient data gets anonymized.
Export Events Downloads a CSV file containing all campaign events, interactions, and timestamps for data export and reporting.
Export Submitters Downloads a CSV file containing all submitters of the campaign.
Upload Reported CSV

Upload a CSV with the users that reported the campaign.

The CSV file must contain the following headers:
Reported By that matches the reporters email.
Date reported(UTC+02:00) Time when the user reported the phishing email. Ex. value 2025-12-24T10:01.066Z

This format as can be exported from Microsoft 365. More information can be found on Microsoft Submissions Admin

Events Data

The events table provides a chronological view of all campaign interactions.

Phishing Club - Campaign events table
Campaign events table showing user interactions, timestamps, and event types

Recipient data

The campaign recipients table displays data for each targeted user, showing their interaction level and current status within the simulation.

Phishing Club - Campaign recipients table
Recipient data with status indicators and action controls

The Status column displays the highest-priority interaction event for each recipient, showing their current engagement level.

Utilize the recipient Actions menu to manually manage email delivery, access detailed event histories, or perform individual recipient management tasks.

Recipient Management Actions
Action Description
Copy Email Copies the personalized email content as HTML source code, enabling custom delivery through alternative channels
View Email Displays the formatted email content in a preview window. Note that viewing will trigger tracking pixels, which records a read event for this recipient
Copy Lure URL Copies the personalized phishing page URL to clipboard for manual distribution or testing purposes
View Events Opens the detailed event timeline for this specific recipient, showing all interactions and timestamps

Click on any recipient name to access their individual timeline view, showing interaction history and event details:

Phishing Club - Campaign recipient events
Recipient event timeline showing interaction history and timestamps

Microsoft Allow Listing

When performing whitebox phishing you should allow list the campaign. To ensure delivery of your phishing simulation campaigns, you can configure allow listing through Microsoft's Advanced Delivery Policy for third-party phishing simulations.

For templates using SMTP configuration, Phishing Club provides access to the required allow listing information. Navigate to the campaign templates page and click Allow listing in the template actions menu to access configuration details.

Phishing Club - Template allow listing
Allow listing configuration access from template actions menu

The allow listing modal displays information required for configuring Microsoft Defender for Office 365 Advanced Delivery Policy.

Microsoft Defender Allow Listing Information
Configuration Field Description and Usage
MAIL FROM Domain The domain component of the sender address configured in your template's email settings (RFC 5321.MailFrom)
Sending IP Address The source IP address for your phishing simulation emails, typically provided by your email infrastructure or SMTP service provider
Simulation URL Pattern Domain pattern for phishing simulation URLs, usually formatted as yourdomain.com/* to allow all paths and subpages

Microsoft Defender Configuration Steps

Follow these steps to configure allow listing in Microsoft Defender for Office 365:

  1. Access Advanced Delivery: Navigate to Microsoft Defender Advanced Delivery
  2. Select Tab: Click the Phishing simulation tab
  3. Create Configuration: Click Add or Edit to configure third-party phishing simulation settings
  4. Enter Values: Input the information from Phishing Club's allow listing modal:
    • Domain: Your MAIL FROM domain
    • Sending IP: Your email sending IP address
    • URLs to Allow: Your simulation domain pattern
  5. Save Configuration: Apply the settings to enable allow listing

For configuration guidance, consult the official Microsoft documentation on Advanced Delivery Policy configuration.